Xen 4.2.x and 4.1.x does not properly restrict access to IRQs, which allows local stub domain clients to gain access to IRQs and cause a denial of service via vectors related to "passed-through IRQs or PCI devices."
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://secunia.com/advisories/55082 | third party advisory |
http://security.gentoo.org/glsa/glsa-201309-24.xml | vendor advisory |
http://lists.opensuse.org/opensuse-updates/2013-06/msg00049.html | vendor advisory |
http://www.debian.org/security/2013/dsa-2662 | vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html | vendor advisory |
http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104537.html | vendor advisory |
http://www.openwall.com/lists/oss-security/2013/04/18/6 | mailing list |
http://www.securityfocus.com/bid/59292 | vdb entry |
http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104538.html | vendor advisory |